summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDivy Srivastava <dj.srivastava23@gmail.com>2022-01-30 18:42:29 +0530
committerGitHub <noreply@github.com>2022-01-30 18:42:29 +0530
commitefa02ffa2a1b5ff76c9b6ba440e69b68b01f8d7f (patch)
tree537f9206cb163a20ead5d8f938f77cdf678c680f
parenta2e4fa471ba3366f7e05bbad59b247e7825b832c (diff)
fix(ext/crypto): enforce 128bits tagLength for AES-GCM decryption (#13536)
-rw-r--r--cli/tests/unit/webcrypto_test.ts29
-rw-r--r--ext/crypto/decrypt.rs9
2 files changed, 38 insertions, 0 deletions
diff --git a/cli/tests/unit/webcrypto_test.ts b/cli/tests/unit/webcrypto_test.ts
index 84cf7d4ca..ba6aaa327 100644
--- a/cli/tests/unit/webcrypto_test.ts
+++ b/cli/tests/unit/webcrypto_test.ts
@@ -1639,3 +1639,32 @@ Deno.test(async function testAESWrapKey() {
assertEquals(new Uint8Array(hmacKeyBytes), new Uint8Array(unwrappedKeyBytes));
});
+
+// https://github.com/denoland/deno/issues/13534
+Deno.test(async function testAesGcmTagLength() {
+ const key = await crypto.subtle.importKey(
+ "raw",
+ new Uint8Array(32),
+ "AES-GCM",
+ false,
+ ["encrypt", "decrypt"],
+ );
+
+ const iv = crypto.getRandomValues(new Uint8Array(12));
+
+ // encrypt won't fail, it will simply truncate the tag
+ // as expected.
+ const encrypted = await crypto.subtle.encrypt(
+ { name: "AES-GCM", iv, tagLength: 96, additionalData: new Uint8Array() },
+ key,
+ new Uint8Array(32),
+ );
+
+ await assertRejects(async () => {
+ await crypto.subtle.decrypt(
+ { name: "AES-GCM", iv, tagLength: 96, additionalData: new Uint8Array() },
+ key,
+ encrypted,
+ );
+ });
+});
diff --git a/ext/crypto/decrypt.rs b/ext/crypto/decrypt.rs
index 9f1157608..40dd3a5b5 100644
--- a/ext/crypto/decrypt.rs
+++ b/ext/crypto/decrypt.rs
@@ -295,10 +295,19 @@ fn decrypt_aes_gcm(
return Err(type_error("iv length not equal to 12"));
}
+ // The `aes_gcm` crate only supports 128 bits tag length.
+ //
+ // Note that encryption won't fail, it instead truncates the tag
+ // to the specified tag length as specified in the spec.
+ if tag_length != 128 {
+ return Err(type_error("tag length not equal to 128"));
+ }
+
let nonce = Nonce::from_slice(&iv);
let sep = data.len() - (tag_length / 8);
let tag = &data[sep..];
+
// The actual ciphertext, called plaintext because it is reused in place.
let mut plaintext = data[..sep].to_vec();
match length {